__________ controls access based on comparing security labels with security clearances.

A. MAC B. DAC

C. RBAC D. MBAC


A. MAC

Computer Science & Information Technology

You might also like to view...

In Query Design view, the query design ________ displays the tables that are used in a query

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is not a merging option?

A) Subtract B) Fragment C) Add D) Combine

Computer Science & Information Technology

Describe Bluetooth.

What will be an ideal response?

Computer Science & Information Technology

______ are people who create, use, and disseminate knowledge and are usually professionals in science, engineering, business, and other areas.

a. Systems analysts Incorrect Incorrect b. Knowledge workers c. Knowledge database administrators d. End users

Computer Science & Information Technology